Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp10787575imu; Thu, 6 Dec 2018 06:50:06 -0800 (PST) X-Google-Smtp-Source: AFSGD/WabooQBf7ajS39WD2eCo7adRpcLg/LZbhDyLuMHIedrshA3ByQDxA691/HN44LIXmwId7s X-Received: by 2002:a17:902:1d4a:: with SMTP id u10mr27206414plu.122.1544107806083; Thu, 06 Dec 2018 06:50:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544107806; cv=none; d=google.com; s=arc-20160816; b=gj4O2THJkGri1P6j5bT0Gxvm3KAuamK8mKLNLjslmFQMomBUSId8QFAzNxpioXjnO5 4mrRpjOlOQTksSGRrUVSog32NVpA/IygOgJgcbczTAOH6glM+tN1So7BS8XbdkKXpb0g h+d1agJYpAcfyKR+PVOCbRbxGaCx/ktPOc2q1JPB9M9SCKY4HENYREUoOacbe4z+PmZu NdXW23SOZNU9Im1TXAFUGebBxaGyVtTi2SlpuDe9WsMkWsKICGzcKYtZRiXaDhLkV9Wv t5AhxDJKq5CtZzeLQ0uLTbIZNg6PJDh2ay/+deTpEoUs1llVisKboVUFs7dhmnuvj2iy a8zQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=vDhc7gpExdIUeA7vU1c4qYpi/Wu/P66f01TJWzk5awU=; b=IhaB82cbhnn1zSBKJC2unjHqWHXNrceSTiiaPlzQxqcXBiZqUxBJICg4AE64JaEuAT lSYxBPZT04/LQB5rV1Lrbu5J84Xw6p04W/irPbRKi9IZBZFiBJaTIa5vm7hvVp6DpHay CaW8IIgXbeO2mQPb+Drr39KMO8BnsN211K329qXPnXHM8e0XfHGiGAwWn4Z2S3MMFZ06 wVfkMZHV5z62Uu7Ow5mfKS6vP8TW7QPcQ58NYS8q0Vpe4a6b+n+Ha5a3Gk9PouTjQbN1 G3+vD4LaPzezVdc0GU/wfn/s2JwpiWo/7m6CAvAgLfO7VvDls5jU+p4GTtGVIRm/2yzM an/g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=uLSrdrxK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id go3si412968plb.97.2018.12.06.06.49.50; Thu, 06 Dec 2018 06:50:06 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=uLSrdrxK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731307AbeLFOqn (ORCPT + 99 others); Thu, 6 Dec 2018 09:46:43 -0500 Received: from mail.kernel.org ([198.145.29.99]:51448 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731286AbeLFOql (ORCPT ); Thu, 6 Dec 2018 09:46:41 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8DC9B20892; Thu, 6 Dec 2018 14:46:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1544107600; bh=7EJ3WKE+k0qn01vlIJHYWCEMshWPG6EUQnepA/NQkAg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=uLSrdrxKwjKUklDGjVSWm6/6UC0cvZNkuUbZXpmzPdcAFWVg78vLFrFbAMjw4c+1B cgo0atsQnkYQZoKDw5epdLCIfllPyztjzfoGUguc5l6YKIPcGNepgM9dwZvD8hsLov n/IH9ETAuNbM5q0Zk+owDvMqsKcn7fmxxH36rC0M= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Xu Wen , Qu Wenruo , Gu Jinxiang , David Sterba , Ben Hutchings Subject: [PATCH 4.9 066/101] btrfs: Verify that every chunk has corresponding block group at mount time Date: Thu, 6 Dec 2018 15:39:05 +0100 Message-Id: <20181206143015.500532751@linuxfoundation.org> X-Mailer: git-send-email 2.19.2 In-Reply-To: <20181206143011.174892052@linuxfoundation.org> References: <20181206143011.174892052@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Qu Wenruo commit 7ef49515fa6727cb4b6f2f5b0ffbc5fc20a9f8c6 upstream. If a crafted image has missing block group items, it could cause unexpected behavior and breaks the assumption of 1:1 chunk<->block group mapping. Although we have the block group -> chunk mapping check, we still need chunk -> block group mapping check. This patch will do extra check to ensure each chunk has its corresponding block group. Link: https://bugzilla.kernel.org/show_bug.cgi?id=199847 Reported-by: Xu Wen Signed-off-by: Qu Wenruo Reviewed-by: Gu Jinxiang Reviewed-by: David Sterba Signed-off-by: David Sterba [bwh: Backported to 4.9: adjust context] Signed-off-by: Ben Hutchings Signed-off-by: Greg Kroah-Hartman --- fs/btrfs/extent-tree.c | 58 ++++++++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 57 insertions(+), 1 deletion(-) --- a/fs/btrfs/extent-tree.c +++ b/fs/btrfs/extent-tree.c @@ -10159,6 +10159,62 @@ btrfs_create_block_group_cache(struct bt return cache; } + +/* + * Iterate all chunks and verify that each of them has the corresponding block + * group + */ +static int check_chunk_block_group_mappings(struct btrfs_fs_info *fs_info) +{ + struct btrfs_mapping_tree *map_tree = &fs_info->mapping_tree; + struct extent_map *em; + struct btrfs_block_group_cache *bg; + u64 start = 0; + int ret = 0; + + while (1) { + read_lock(&map_tree->map_tree.lock); + /* + * lookup_extent_mapping will return the first extent map + * intersecting the range, so setting @len to 1 is enough to + * get the first chunk. + */ + em = lookup_extent_mapping(&map_tree->map_tree, start, 1); + read_unlock(&map_tree->map_tree.lock); + if (!em) + break; + + bg = btrfs_lookup_block_group(fs_info, em->start); + if (!bg) { + btrfs_err(fs_info, + "chunk start=%llu len=%llu doesn't have corresponding block group", + em->start, em->len); + ret = -EUCLEAN; + free_extent_map(em); + break; + } + if (bg->key.objectid != em->start || + bg->key.offset != em->len || + (bg->flags & BTRFS_BLOCK_GROUP_TYPE_MASK) != + (em->map_lookup->type & BTRFS_BLOCK_GROUP_TYPE_MASK)) { + btrfs_err(fs_info, +"chunk start=%llu len=%llu flags=0x%llx doesn't match block group start=%llu len=%llu flags=0x%llx", + em->start, em->len, + em->map_lookup->type & BTRFS_BLOCK_GROUP_TYPE_MASK, + bg->key.objectid, bg->key.offset, + bg->flags & BTRFS_BLOCK_GROUP_TYPE_MASK); + ret = -EUCLEAN; + free_extent_map(em); + btrfs_put_block_group(bg); + break; + } + start = em->start + em->len; + free_extent_map(em); + btrfs_put_block_group(bg); + } + return ret; +} + int btrfs_read_block_groups(struct btrfs_root *root) { struct btrfs_path *path; @@ -10343,7 +10399,7 @@ int btrfs_read_block_groups(struct btrfs } init_global_block_rsv(info); - ret = 0; + ret = check_chunk_block_group_mappings(info); error: btrfs_free_path(path); return ret;